1, check the code of the website, check whether the hacker placed the web Trojan and ASP Trojan, website code Is there a backdoor program?
2, check the security of the website code, check whether there are SQL injection vulnerabilities, upload file vulnerabilities and other common hazards that endanger the site security.
3, analyze the log of the server operating system, check whether the system is invaded, check whether the Trojan has been installed by the hacker and what changes have been made to the system.
4, the server operating system apply the latest patch, reasonable configuration and installation of common software applications (such as firewalls, antivirus software, databases, etc.), and server software update for the security, stability A compatible version.
5, reasonable configuration and optimization of the server operating system, log out unnecessary system components, stop unnecessary dangerous services, disable dangerous ports, run through the smallest Service for maximum security.
6. Hide and forge the service port and prompt information of commonly used applications to prevent hackers from using the scanning tool to obtain server information.
7. Reasonable configuration permissions. Each site is configured with an independent internet guest account, which restricts the access rights of the internet guest account. It only allows it to read and execute the website. The program only has read and write access to the website directory of Party A's website, prohibits access to other directories, and restricts its execution of dangerous commands. This way, even if a hacker has a way to upload a Trojan to the website of Party A, it cannot be executed. , it will not cause harm to the system.
8, reduces permission to run SQL database, SERV-U FTP services and other applications, delete MSSQL database unnecessary, dangerous stored procedures, to prevent hackers exploit Further intrusion and elevation of permissions, and through effective settings, prevent unknown overflow attacks.
Note: Maintenance project only for windows server operating system platforms. The software involved in the installation of the above services, copyright issues are resolved by the customer. Only modify and write the code security part of the customer website code, and do not modify or write the rest of the customer website code.
I believe that many people have not used win8 system, and people who have not used win8 system, I be
Compared with Win7 or previous versions of Windows system, the most intuitive change of Win8 system
When we upgrade the system, we often get trouble with receiving a problem, that is, what should be d
Win8.1 installation failed error 0x80004005 how to solve
Win8 system uses virtual optical drive graphic tutorial
Win8 recovery Win7 boot sound operation method
Simple setup makes Win8 desktop more conducive to touch screen operation
How to change the user account name in Windows 8
What does the cdr file open with? Win8 open cdr file method
Win8 computer full-screen game method
A detailed tutorial on using the Metro application under Win8.1
Win8 taskbar small white flag red fork how to do?
How to clean up swap, buffer and cache in Linux
Solve 100% of Win8 system disk usage
Improve Windows 8 browser can not see Baidu image problems
Linux system how to configure rdate time server
Microsoft expands sales channels to catch up with Apple
The survey said that Windows 8 market share is only 1%
Windows 7 settings use a program to open a file type
Win10 shortcut icon small arrow how to remove Win10 shortcut small arrow removal method